×

Telecommunications network access rejection

  • US 8,565,764 B2
  • Filed: 12/11/2009
  • Issued: 10/22/2013
  • Est. Priority Date: 12/11/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of controlling an attach procedure of a device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the method comprising:

  • assessing authenticity of the attach rejection by determining whether there is a trust relationship between the device and the network that existed prior to the attach request;

    determining a length of a time period that must expire before performance of a subsequent attach attempt by the device to the network is permitted unless a particular event occurs within the time period, wherein the length of the time period is determined in dependence upon the authenticity assessment, wherein the length of the time period is increased in response to the rejection being deemed authentic and wherein the length of the time period further depends upon a number of prior attach rejections of the device from the telecommunications network; and

    performing the subsequent attach attempt in response to at least one of;

    (i) expiration of the time period;

    or(ii) occurrence of the particular event within the time period, wherein the particular event includes at least one of;

    power cycling of the device or a minimum threshold movement in location of the device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×